GB2379583A - Outgoing call control and data transfer for a portable terminal device - Google Patents
Outgoing call control and data transfer for a portable terminal device Download PDFInfo
- Publication number
- GB2379583A GB2379583A GB0215887A GB0215887A GB2379583A GB 2379583 A GB2379583 A GB 2379583A GB 0215887 A GB0215887 A GB 0215887A GB 0215887 A GB0215887 A GB 0215887A GB 2379583 A GB2379583 A GB 2379583A
- Authority
- GB
- United Kingdom
- Prior art keywords
- data
- terminal device
- mobile terminal
- channel data
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
A mobile telephone or other terminal device monitors the control data channel with the radio base station. When the phone is lost, the control data channel contains special data, and outgoing call control is executed, unauthorised browsing of personal data is prohibited, and personal data is pulled out from the mobile phone. Unauthorised use and leakage of personal data are prevented without the need to establish an open communication channel with the mobile phone. The device may be used in a data storage system which is connected to a public line network through a modem, and is provided with a personal computer operated by a user. The personal computer can establish communications between a base station and a lost mobile phone. Permission data for outgoing call control arid protection of personal data is entered in the lost mobile phone. It is determined whether or not the permission data matches a request data from the personal computer. When they match each other, the personal data pulled out of the lost mobile phone is stored in the personal computer. The personal data can be transferred by connecting a substitute mobile phone through a connection cable.
Description
PORTABLE TERMINAL DEVICE
ANI) METHODS THEREFOR
BACKGROUND OF THE INVENTION
The present invention relates to a portable terminal device, particularly a wireless portable terminal device, to an outgoing call control method, and to a data transfer method.
Portable terminal devices and mobile phones, which are generally referred to as a' PHS" and "cell phone," are small and lightweight, and are provided with various additional functions, and they have made remarkable progress and are practically replacing the conventional cable telephone system.
Mobile phones have not only a basic communications function, but also a telephone book function, an outgoing call history entry function, an incoming call history entry function, a memo recording function, etc. Generally, a user's personal data are stored in a memory in advance to carry out the above functions. And then, the user, by handling the operation button(s), can fetch the contents of the memory at any time.
Moreover, mobile phones typically have a locking dial function to prevent billing the owner of the mobile phone for an unauthorized outgoing call made by a person other than the owner when the mobile phone is stolen or lost. The function also prohibits them from browsing personal data stored in the memory.
This dial lock capability can be set by the owner of the mobile phone by registering his or her password in the mobile phone, and pressing a specific operation button, e.g.,, pressing a function key for a prolonged time. The dial lock can be released by inputting the registered password, and pressing the specific operation button, e.g.,, pressing the communications button for a prolonged time.
Although an unauthorized outgoing call or unauthorized browsing of personal data can be almost completely deleted by constantly using the above mentioned dial lock, and releasing the lock each time communications are started, setting a dial lock and releasing the lock each time communications are started is ti,lle-consull.ing, and therefore not perfolllled. Therefore, when a rllobile phone is stolen or lost, there is the possibility that a person other than the owner uses the mobile phone without authorization, thereby causing financial damage and unauthorized browsing through personal data.
Therefore, as disclosed in Japanese Patent Laid-Open No. 2000-
151798, a signal code for controlling outgoing call and for prohibition against browsing personal data is entered in advance in the body of a mobile phone. The lost mobile phone is called from a subscribed phone or another mobile phone through an exchange system. A request code is transmitted with a communications circuit established, and outgoing call control is executed and memory data is locked when the signal code of the lost mobile phone matches the request code.
Simultaneously, the personal data is pulled out by the equipment such as the personal computer, etc. connected to a telephone line as necessary, and then the personal data stored on the lost mobile phone is deleted.
-2
The above mentioned case can also be applied not only to a lost mobile phone, but also to all portable terminal devices such as mobile personal computers or personal digital assistants having the communication 5 functions.
The conventional portable terminal device can lock an operation key or personal data to prevent an unauthorized use or unauthorized leakage of personal data by a third party using stolen or lost equipment only after a 10 communications channel circuit is established. That is, the above mentioned process can only be performed when an answer is returned in response to a call to a stolen or lost portable terminal device. However, it is not likely that a third party will answer the call to the stolen or lost 15 equipment. Therefore, the condition of possibly issuing an unauthorized outgoing call and browsing personal data still continues. As a result, a countermeasure is only to issue a request an exchange center to reject an outgoing call, and to perform the outgoing call rejection by the exchange 20 center, thereby having no means for prohibition against browsing personal data.
SUMMARY OF THE INVENTION
According to one aspect of the present invention a 25 mobile terminal device comprises a radio means for communicating communications channel data with a radio base station, and for communicating control channel data - 3 -
with the radio base station at an appropriate timing independent of the control channel data. The mobile terminal device also comprises storing means for storing a predetermined information and judging means for judging whether the predetermined information is contained in the control channel data received by the radio means. The mobile terminal device further comprises controlling means for controlling the radio means on the basis of the result of the judging means. The controlling means exerts control over an outgoing call if the predetermined information is contained in the control channel data. The conkolling means may prohibit a key operation for issuing a call from the mobile terminal device. The predeter,iined ir.fo...ztion is the data that requests outgoing, cat! control. Preferably, mobile terminal device further comprises display means for displaying contents of outgoing call control when it is performed.
Moreover, a mobile terminal device of the present invention comprises radio means for communicating communications channel data with a radio base station, and for communicating control channel data with the radio base station at an appropriate timing independent of the control channel data. The mobile terminal device farther comprises storing means for storing a predetermined information and a personal information and judging means for judging whether the predetermined information is contained in the control channel data received by the radio means.
The mobile terminal device further comprises controlling means for controlling the personal information on the basis of the result of the judging means. The controlling means transfers a personal information stored in the mobile terminal device if the predetermined information is contained in the control channel data. The personal information is transferred to a personal computer connected to at least a radio - 4
channel or a cable channel. The controlling means may prohibit a key operation for reading the personal information. Preferably, the mobile terminal device further comprises display means for displaying contents of data locking when it is performed. An outgoing call control method of the present invention comprises storing a predetermined information, communicating communications channel data with a radio base station, communicating control channel data with the radio base station at an appropriate timing independent of the control channel data, judging whether the predetermined information is contained in the control channel data and controlling an outgoing call if the predetermined information is contained in the control channel data. The controlling of an outgoing call may prohibit a key operation for issuing a call from the mobile terminal device. The predetermined information is the data that requests outgoing call control. The outgoing call control method of the present invention further comprises displaying contents of outgoing call control when it is performed.
Moreover, an outgoing call control method of the present invention includes storing predetermined information and personal information, and communicating communications channel data with a radio base station. The method further comprises communicating control channel data with the radio base station at an appropriate timing independent of the control channel data, and judging whether the predetermined information is contained in the control channel data. Finally, the method comprises transferring the personal information if the predetermined information is contained in the control channel data. The personal information is transferred to a personal computer connected to at least one of a radio channel or a
cable channel. The method further comprises prohibiting a key operation for reading the personal information. The method may comprise displaying contents of data locking when it is performed.
A mobile terminal device of the present invention comprises a radio unit that communicates communications channel data with a radio base station, and that communicates control channel data with the radio base station at an appropriate timing independent of the control channel data. The mobile terminal device further comprises a memory that stores predetermined information, and an analysis unit that judges whether the predetermined information is contained in the control channel data received by the radio unit. The mobile term..ina! device filcher comprises a control unit that controls the radio unit on the basis of the result of the analysis unit.
The control unit exerts control over an outgoing call if the predetermined information is contained in the control channel data. The control unit may prohibit a key operation for issuing a call from the mobile terminal device. The predetermined information is the data that requests outgoing call control. The mobile terminal device further comprises a display unit that displays contents of outgoing call control when it is performed.
A mobile terminal device of the present invention comprises radio unit that communicates communications channel data with a radio base station, and that communicates control channel data with the radio base station at an appropriate timing independent of the control channel data. The mobile terminal device further comprises a memory that stores predetermined information and personal information, and an analysis unit that judges whether the predetermined information is contained in the control channel data received by the radio unit. The mobile - 6
terminal device further comprises a control unit that controls the personal information on the basis of the result of the analysis unit. The control unit transfers a personal information stored in the mobile terminal device if the predetermined information is contained in the control channel data. The personal information is transferred to a personal computer connected to a radio channel or a cable channel.
The control unit may prohibit a key operation for reading the personal information.
The mobile terminal device further comprises a display that displays contents of data locking when it is performed.
According to the present invention, the portable terminal device of the present invention does not use a communications channel circuit, but uses a control channel circuit when any of outgoing call control, the prohibition against unauthorized browsing of personal data, and the retreival of personal data is performed by remote control. By periodically receiving the control channel, the presence/absence of a request is analyzed, thereby performing control with higher reliability. That is, when a communications channel circuit is used in the remote control, the control can be interrupted on the base station side depending on the state of the communications traffic. For example, it can be interrupted during the transfer of personal data. Using a control channel, such interruption cannot occur, thereby reserving a circuit with high reliability.
Since remote control is performed by using a control channel without remote control using a communications channel circuit, it is not necessary for an answer from the third party who now holds a stolen or lost equipment, and
unauthorized outgoing calls or unauthorized browsing of personal data can be immediately prohibited.
Accordingly, the present invention can provide a portable terminal device capable of performing outgoing call control on a stolen or lost portable terminal device with high reliability without requesting an unauthorized user to return an answer or requesting an exchange center to reject an outgoing call, and capable of prohibiting the unauthorized browsing of personal data without requesting an unauthorized user to return an answer.
BRIEF DESCRIPTION OF THE DRAWINGS
These and other aspects, features arid advantages of the invention will become more fully apparent from the following detailed description taken in
conjunction with accompanying drawings. In the drawings: FIG. 1 shows a configuration of an entire system of a portable terminal device according to an embodiment of the present invention; FIG. 2 is a block diagram of a circuit of a central portion of a lost mobile phone 1 shown in FIG. 1; FIG. 3 is a flowchart of the operation of a control channel of the lost mobile phone 1 shown in FIG. 1; and FIG. 4 is a flowchart of the detailed operations of a data transfer process shown in FIG. 3.
DETAILED DESCRIPTION OF THE EMBODIMENTS
Hereinafter, each embodiment of the present invention will be described in detail with reference to the drawings.
An embodiment is obtained by applying the present invention to a mobile phone, and the entire configuration will be described below by referring to FIG. 1. A lost mobile phone 1 can perform normal communications during power-
up, and can be set in a state of browsing telephone book data and incoming/outgoing call history data by a key operation.
The portable terminal device is configured to communicate with a number of mobile phones through an antenna 4 provided in a base station 3 connected via cable to a public line network 2. Practically, the equipment is configured to include radio means capable of communicating communications channel data with base station 3, and capable of communicating control channel data with the base station 3 at an appropriate timing independent of the communications channel data.
On the other hand, a data storage system 6 is connected to the public line network 2 through a modem device, which is not shown in FIG. 1. That is, a personal computer 7 operated by a user 5 is connected to the public line network 2.
At a result, communications with the personal computer 7 and both the base station 3 and the lost mobile phone 1 can be established. The personal data can be pulled out from the lost mobile phone 1 (as described later) is temporarily stored in the memory in the personal computer 7. A substitute mobile phone 8 is connected through a connection cable 9, thereby transferring the personal data to the substitute mobile phone 8.
The circuit of the portable terminal device (lost mobile phone 1) embodying the present invention is configured as shown in FIG. 2. That is, the equipment is provided with a conkrol unit 10 for combining and controlling the
operation of the mobile phone 1, and a radio unit 12 having an antenna 11 is connected to the control unit 10.
The radio unit 12 forms the central portion of radio means capable of communicating communications channel data with the base station 3 through the antenna it and the antenna 4, and communicating control channel data at an appropriate timing independent of the communications channel data.
A display unit 13 connected to the control unit 10 is configured to include display means capable of displaying a basic call functions, and displaying the contents of outgoing call control and/or data locking when they are performed.
The equipr.er.t data specifying the equipment (lost mobile phone 1i, and personal data 16 formed by telephone book data, outgoing call history data, incoming call history data, memo data, etc. is included in a memory block 14 connected to the control unit 10. The transfer permission data for permission of a request to transfer the personal data 16 is registered in the memory block 14, and permission data 15 in which data for permission of a request to lock a dial and memory is registered is included in the memory block 14. Thus, the central portion of the registration means can be configured.
received data analysis unit 17 connected to the control unit 10 forms determination means. Practically, the determination means compares transfer request data with the transfer permission data of the permission data 15, and determines whether or not they match each other when the control channel data received by the radio unit 12 includes the transfer request data. If the determination means detects a matching result between the transfer request data and the transfer permission data, then control means has the control unit 10 control the radio unit 12 -
_3 to transfer the personal data 16 to a predetermined destination. The personal data 16 will be transferred to the personal computer 7 of the data storage system 6. The control means also controls the radio unit 12 through the control unit 10 to exert control over an outgoing call when a matching result is detected between the outgoing call control request data and the outgoing call control permission data.
An arrow, shown in FIG. 1 by dotted lines from the user 5 toward to the antenna 4, indicates an electric wave path for remote control of the outgoing call control, prohibition against browsing personal data, and pull-out of personal data on the lost mobile phone 1. User 5 accomplishes this by using another mobile phone.
This operation will be described later, and the operation of the personal computer 7 connected to the public line network 2 at the time of performing the remote control will be described below by referring to the flowchart shown in FIG. 3.
The operations described below are performed on the assumption that the lost mobile phone 1 is located in the position where the lost mobile phone 1 can receive an electric wave transmitted through the antenna 4, and that the lost mobile phone 1 is powered up and set in a reception wait state. The outgoing call control operation and the data transfer operation are performed by obtaining data when the control channel data transmitted at an appropriate timing from the base station 3 through the antenna 4 is received by the radio unit 12 of the lost mobile phone 1 at S1. At S2, the received data analysis unit 17 analyzes the data, and then, at S3, the control unit 10 acts accordingly.
At S3, it is determined whether or not the received control channel data includes a request to transfer the personal data 16 or a request for the permission data 15. If there are no such requests (NO), then the process terminates.
- 11
On the other hand, if it is determined YES at S3, then at S4, it is determined whether or not there is memory lock permission data. If there is the permission data (YES), then control is passed to S5, where the request to lock the memory block is issued. Control then passed to S6, where it is determined whether or not there is personal data transmission permission. If it is determined NO at S4, however, control proceeds directed to S6. At S6, it is determined if there is permission to transfer personal data. If it is determined YES at S7, then a request to start transferring person data is issued. Otherwise, if it is determined NO at S6, control passes to S8, and the data transferring process is performed after proceeding to next S8, thereby terminating the process.
As shown in the flowchart in detail in FIG. 4, it is determined whether or not there is a request to start transfer of the personal data 16 in S9. If there is the request (YES), then control passes to S10, where the telephone book data, outgoing call history data, incoming call history data, and memo data stored in the personal data 16 is read by the control unit 10 and transmitted through the antenna 4, the radio unit 12 and the antenna 11 to the memory of the personal computer 7. The data is temporarily stored in the memory of the personal computer 7. Control is then passed to S1 1.
It is determined at S11 whether of not there is a request to lock the memory block 14. If there is the request (YES), then control is passed to S12, and the memory block 14 is locked, thereby terminating the process.
If it is determined in S9 that there is no request to start transferring the data (NO), then the above mentioned S11 and S12 are not performed.
- 12
Thus, outgoing call control is executed on the lost mobile phone 1, the unauthorized browsing of personal data is prohibited and the personal data is pulled from the lost mobile phone 1. Therefore, the third party having the lost mobile phone 1 cannot issue a call, and cannot browse personal data, thereby completely preventing an unauthorized use and unauthorized leakage of the personal data by the third party.
Furthermore, since the above mentioned preventing process is performed using the control channel without establishing a circuit of a communications channel, the process can be realized without waiting for a response to a call to the lost mobile phone 1. That is, it can be realized only if the lost mobile phone 1 ham been powered up and is located in the service area of the antenna 4, thereby realizing a perfect countermeasure.
If the lost mobile phone 1 has not been powered up yet, then it is powered up and simultaneously a call is automatically issued through a control channel circuit. Therefore, in response to the call, the base station 3 prepares data to remotely control the outgoing call control, the prohibition against unauthorized browsing of personal data, and the retrieval of personal data in advance. As a result, when the lost mobile phone 1 is powered up, the outgoing call control, the prohibition against browsing personal data, and the retrieval of personal data can be simultaneously performed.
On the other hand, as an example other than the above mentioned case in which the remote control is performed on the lost mobile phone 1 through the public line network 2 and the base station 3, the user 5 can perform remote control on the base station 3 using a mobile phone. In this case, a control code for execution - 13
of the outgoing call control, the prohibition against browsing personal data, and the retrieval of personal data is transmitted from the user 5.
In this case, the retrieval of personal data can be directly performed if there is a sufficiently large memory capacity of the equipment. If there is no sufficiently large memory, the data is temporarily stored in the base station 3, and is fetched later using a personal computer or other communication devices By allowing the personal computer 7 storing the personal data 16 fetched from the lost mobile phone 1 to be remotely controlled to be connected to the substitute mobile phone 8 with the connection cable 9 connected through a predeten.n.ined interface circuit Ad to execute the edit so^.,are of the data of the mobile phone built in the personal computer 7, the personal data 16 of the lost mobile phone 1 can be transferred as is in the substitute mobile phone 8, or in an edited state.
As a result, the personal data can be retrieved regardless of whether or not the lost mobile phone 1 is practically held at hand.
In the explanation above, the portable terminal device (lost mobile phone 1) comprises a first control means for exerting control over an outgoing call by controlling the radio means when a matching result is detected between the outgoing call control request data and the outgoing call control permission data. The portable terminal device comprises a second control means for transferring the personal data to a predetermined destination by controlling the radio means when a matching result is detected between the transfer request data and the transfer permission data. However, the portable terminal device can also be configured by comprising one of the first control means and the second control means.
- 14
The outgoing call control on the portable terminal device can function as software by directly prohibiting a call issuing operation, or can perform indirect prohibition by providing operation lock means for suppressing the key operation of issuing a call. Similarly, the prohibition against browsing personal data can function as software by directly prohibiting a browsing operation, or can perform indirect prohibition by providing data lock means for suppressing the key operation of browsing the personal data. The personal data pulled out from the portable terminal device (lost mobile phone 1) can be stored in the personal computer 7, directly stored in the substitute mobile phone 8, temporarily stored in the base station 3 and then fetched later, etc. Furthermore, the permission data registered in advance in the lost mobile phone 1 for determination of the outgoing call control, the prohibition against browsing personal data, and the retrieval of personal data can be configured by including a telephone number and/or the equipment number or by a password at the discretion of the user.
Additionally, when the outgoing call control and/or data lock is perfonned, the contents can be displayed indicating "this phone is not available" or "please contact the owner XXX" on the display unit 13.
Obviously, numerous additional modifications and variations of the present invention are possible in light of the above teachings. It is, therefore, to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described herein.
- 15
Claims (31)
1. A mobile terminal device comprising: radio means for communicating communications channel data with a radio base station, and for communicating control channel data with said radio base station at an appropriate timing independent of said control channel data; storing means for storing predetermined information; judging means for judging whether said predetermined information is contained in said control channel data received by said radio means; and controlling means for cor, trolling said radio means on the basis of the result of said judging means.
2. The mobile terminal device as claimed in claim 1, wherein said controlling means prevents an outgoing call if said predetermined information is contained in said control channel data.
3. The mobile terminal device as claimed in claim 2, wherein said controlling means prohibits a key operation for issuing a call from said mobile terminal device.
4. The mobile terminal device as claimed in claim 3, wherein said predetermined information is the data that requests outgoing call control.
- 16
5. The mobile terminal device as claimed in claim 4, further comprising display means for displaying the contents of outgoing call control when it is performed.
6. A mobile terminal device comprising: radio means for communicating communications channel data with a radio base station, and for communicating control channel data with said radio base station at an appropriate timing independent of said control channel data; storing means for storing predetermined information and personal information; judging means for judging whether said predetermined information is contained in said control channel data received by said radio means; and controlling means for controlling said personal information on the basis of the result of said judging means.
7. The mobile terminal device as claimed in claim 6, wherein said controlling means transfers said personal information stored in said mobile terminal device if said predetermined information is contained in said control channel data.
8. The mobile terminal device as claimed in claim 7, wherein said personal information is transferred to a personal computer connected to at least one of a radio channel and a cable channel.
- 17
f '
9. The mobile terminal device as claimed in claim 8, wherein said controlling means prohibits a key operation for reading said personal information.
10. The mobile terminal device as claimed in claim 9, further comprising display means for displaying contents of data locking when it is performed.
11. An outgoing call control method, comprising: storing predetermined information; communicating communications channel data with a radio base station; cor=.l licating, control channel data with said radio base station at an appropriate timing independent of said control channel data; judging whether said predetermined information is contained in said control channel data; and controlling an outgoing call if said predetermined information is contained in said control channel data.
12. The outgoing call control method as claimed in claim 11, wherein said controlling an outgoing call comprises prohibiting a key operation for issuing a call from said mobile terminal device.
13. The outgoing call control method as claimed in claim 12, wherein said predetermined information is the data that requests outgoing call control.
- 18
14. The outgoing call control method as claimed in claim 13, further comprising displaying contents of outgoing call control when it is performed.
15. A data transfer method, comprising: storing predetermined information and personal information; communicating communications channel data with a radio base station; communicating control channel data with said radio base station at an appropriate timing independent of said control channel data; judging whether said predetermined information is contained in said control channel data; and transferring said personal information if said predetermined information is contained in said control channel data.
16. The data transfer method as claimed in claim 15, wherein said personal information is transferred to at least one of a personal computer connected to a radio channel and a cable channel.
17. The data transfer method as claimed in claim 16, further comprising prohibiting a key operation for reading said personal information.
18. The data transfer method as claimed in claim 17, further comprising displaying contents of data locking when it is performed.
- 19
- in
19. A mobile terminal device comprising: a radio unit that communicates communications channel data with a radio base station, and that communicates control channel data with said radio base station at an appropriate timing independent of said control channel data; a memory that stores a predetermined information; an analysis unit that judges whether said predetermined information is contained in said control channel data received by said radio unit; and a control unit that controls said radio unit on the basis of the result of said analysis unit.
20. The mobile terminal device as claimed in claim 19, wherein said control unit controls an outgoing call if said predetermined information is contained in said control channel data.
21. The mobile terminal device as claimed in claim 20, wherein said control unit prohibits a key operation for issuing a call from said mobile terminal device.
22. The mobile terminal device as claimed in claim 21, wherein said predetermined information is the data that requests outgoing call control.
23. The mobile terminal device as claimed in claim 22, further comprising a display unit that displays contents of outgoing call control when it is performed. - 20
I/ !
24. A mobile terminal device comprising: a radio unit that communicates communications channel data with a radio base station, and that communicates control channel data with said radio base station at an appropriate timing independent of said control channel data; a memory that stores predetermined information and personal information; an analysis unit that judges whether said predetermined infonnation is contained in said control channel data received by said radio unit; and a control unit that controls said personal information on the basis of the result of said analysis unit.
25. The mobile terminal device as claimed in claim 24, wherein said control unit transfers a personal information stored in said mobile terminal device if said predetermined information is contained in said control channel data.
26. The mobile terminal device as claimed in claim 25, wherein said personal information is transferred to at least one of a personal computer connected to a radio channel and a cable channel.
27. The mobile terminal device as claimed in claim 26, wherein said control unit prohibits a key operation for reading said personal information.
28. The mobile terminal device as claimed in claim 27, further comprising a display that displays contents of data locking when it is performed.
-21
-
29. A mobile terminal device substantially as herein described with reference to the drawings.
30. An outgoing call control method substantially as herein described with reference to the drawings.
5
31. A data transfer method substantially as herein described with reference to the drawings.
- 22
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2001214651A JP2003032354A (en) | 2001-07-16 | 2001-07-16 | Mobile communication device |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0215887D0 GB0215887D0 (en) | 2002-08-14 |
GB2379583A true GB2379583A (en) | 2003-03-12 |
GB2379583B GB2379583B (en) | 2003-10-01 |
Family
ID=19049426
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0215887A Expired - Fee Related GB2379583B (en) | 2001-07-16 | 2002-07-09 | Portable terminal device and methods therefor |
Country Status (4)
Country | Link |
---|---|
US (1) | US20030013491A1 (en) |
JP (1) | JP2003032354A (en) |
CN (1) | CN1398097A (en) |
GB (1) | GB2379583B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2388752A (en) * | 2002-04-09 | 2003-11-19 | Nec Corp | Disablement of a lost or stolen mobile |
GB2393881A (en) * | 2002-09-04 | 2004-04-07 | Nec Corp | Remotely accessing information stored in a mobile phone |
GB2407458A (en) * | 2003-08-07 | 2005-04-27 | Radioscape Ltd | Preventing use of lost/stolen article by transmission of blocking code |
GB2381703B (en) * | 2001-11-02 | 2006-05-10 | Agere Syst Guardian Corp | Wireless device temporary recovery mode services and functionality |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW586307B (en) * | 2002-12-13 | 2004-05-01 | Inventec Appliances Corp | Recovery method for mobile phone data |
JP2004274310A (en) | 2003-03-07 | 2004-09-30 | Sony Ericsson Mobilecommunications Japan Inc | Mobile terminal device |
US20060281450A1 (en) * | 2003-04-01 | 2006-12-14 | X-Cyte, Inc., A California Corporation | Methods and apparatuses for safeguarding data |
JP2005141688A (en) * | 2003-11-10 | 2005-06-02 | Nec Corp | Mobile communication terminal and content management method |
US20050186954A1 (en) * | 2004-02-20 | 2005-08-25 | Tom Kenney | Systems and methods that provide user and/or network personal data disabling commands for mobile devices |
US7564799B2 (en) * | 2004-04-23 | 2009-07-21 | Intermec Ip Corp. | System and method for providing seamless roaming |
US7205895B2 (en) * | 2004-06-29 | 2007-04-17 | International Business Machines Corporation | Locating a wireless device |
US7280652B2 (en) | 2004-09-13 | 2007-10-09 | Research In Motion Limited | Handheld electronic device having improved phone call log, and associated method |
JP2006287503A (en) * | 2005-03-31 | 2006-10-19 | Nec Corp | Security enhancement system, security enhancement method, and its program |
TW200644592A (en) * | 2005-06-08 | 2006-12-16 | Benq Corp | Method for operating handset remote listen-in using short messages |
US9148431B2 (en) | 2006-12-12 | 2015-09-29 | Qualcomm Incorporated | Systems and methods for caller identification customization and remote management of communication devices |
US9792453B2 (en) * | 2007-09-26 | 2017-10-17 | Lenovo (Singapore) Pte. Ltd. | Remote computer lockdown |
CN101960738B (en) * | 2008-02-28 | 2014-11-05 | 思蒙株式会社 | Method and system of providing personal information control service for mobile communication terminal |
JP5472959B2 (en) * | 2008-04-22 | 2014-04-16 | Necインフロンティア株式会社 | Electronic device, key lock setting method, key lock setting program, and program recording medium |
US8660530B2 (en) | 2009-05-01 | 2014-02-25 | Apple Inc. | Remotely receiving and communicating commands to a mobile device for execution by the mobile device |
US8666367B2 (en) | 2009-05-01 | 2014-03-04 | Apple Inc. | Remotely locating and commanding a mobile device |
US8670748B2 (en) | 2009-05-01 | 2014-03-11 | Apple Inc. | Remotely locating and commanding a mobile device |
US9158496B2 (en) * | 2012-02-16 | 2015-10-13 | High Sec Labs Ltd. | Secure audio peripheral device |
TWI499933B (en) * | 2013-11-21 | 2015-09-11 | Qnap Systems Inc | Electronic device and login method therefore |
CN105100362A (en) * | 2014-05-20 | 2015-11-25 | 中兴通讯股份有限公司 | Fraud call identification method, fraud prevention method and call terminal |
US10868902B2 (en) * | 2018-04-16 | 2020-12-15 | Mobileyme Llc | System and method for using a secondary device to access information stored remotely |
CN108848508B (en) * | 2018-08-30 | 2021-04-02 | 中国联合网络通信集团有限公司 | Pseudo base station identification method, mobile terminal and background system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000151798A (en) * | 1998-11-05 | 2000-05-30 | Sharp Corp | Portable telephone provided with dial/data locking function |
US6091945A (en) * | 1996-03-29 | 2000-07-18 | Sony Corporation | Authentication method for radio communication system, radio communication system, radio communication terminal and communication managing apparatus |
JP2001352579A (en) * | 2000-06-07 | 2001-12-21 | Nec Corp | Security system and security method for portable telephone set |
JP2002159052A (en) * | 2000-11-17 | 2002-05-31 | Nec Kofu Ltd | Mobile terminal with finger print authentication function |
JP2002185631A (en) * | 2000-12-14 | 2002-06-28 | Nec Corp | Backup service system for telephone directory information, and method for executing backup service of telephone directory information |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5915225A (en) * | 1996-03-28 | 1999-06-22 | Ericsson Inc. | Remotely retrieving SIM stored data over a connection-less communications link |
JP3098442B2 (en) * | 1997-01-28 | 2000-10-16 | 日本電気移動通信株式会社 | Telephone system |
JP3621612B2 (en) * | 1999-09-09 | 2005-02-16 | 株式会社日立国際電気 | Mobile phone |
US6529724B1 (en) * | 1999-10-26 | 2003-03-04 | Qualcomm Incorporated | System and method for managing contact information based on use of a communications device |
JP3404353B2 (en) * | 2000-03-31 | 2003-05-06 | 真二 青山 | Data backup method for portable telephone, portable telephone and data backup device for portable telephone |
US6662023B1 (en) * | 2000-07-06 | 2003-12-09 | Nokia Mobile Phones Ltd. | Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused |
US6813487B1 (en) * | 2000-10-18 | 2004-11-02 | David Alan Trommelen | Method and apparatus for securing data stored in a remote electronic device |
US6813498B1 (en) * | 2000-10-27 | 2004-11-02 | Lucent Technologies Inc. | Apparatus, method and system for detection and recovery of missing wireless devices in communication systems |
-
2001
- 2001-07-16 JP JP2001214651A patent/JP2003032354A/en active Pending
-
2002
- 2002-07-09 GB GB0215887A patent/GB2379583B/en not_active Expired - Fee Related
- 2002-07-12 US US10/193,308 patent/US20030013491A1/en not_active Abandoned
- 2002-07-16 CN CN02126868A patent/CN1398097A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6091945A (en) * | 1996-03-29 | 2000-07-18 | Sony Corporation | Authentication method for radio communication system, radio communication system, radio communication terminal and communication managing apparatus |
JP2000151798A (en) * | 1998-11-05 | 2000-05-30 | Sharp Corp | Portable telephone provided with dial/data locking function |
JP2001352579A (en) * | 2000-06-07 | 2001-12-21 | Nec Corp | Security system and security method for portable telephone set |
JP2002159052A (en) * | 2000-11-17 | 2002-05-31 | Nec Kofu Ltd | Mobile terminal with finger print authentication function |
JP2002185631A (en) * | 2000-12-14 | 2002-06-28 | Nec Corp | Backup service system for telephone directory information, and method for executing backup service of telephone directory information |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2381703B (en) * | 2001-11-02 | 2006-05-10 | Agere Syst Guardian Corp | Wireless device temporary recovery mode services and functionality |
GB2388752A (en) * | 2002-04-09 | 2003-11-19 | Nec Corp | Disablement of a lost or stolen mobile |
GB2388752B (en) * | 2002-04-09 | 2004-10-13 | Nec Corp | Mobile communication terminal |
US7245907B1 (en) | 2002-04-09 | 2007-07-17 | Nec Corporation | Mobile communication terminal remote control system, mobile communication terminal, remote control method, and remote control program |
GB2393881A (en) * | 2002-09-04 | 2004-04-07 | Nec Corp | Remotely accessing information stored in a mobile phone |
GB2393881B (en) * | 2002-09-04 | 2006-05-10 | Nec Corp | Mobile telephone apparatus with remote access function for external network and remote access method for mobile communication system |
US8014758B2 (en) | 2002-09-04 | 2011-09-06 | Nec Corporation | Mobile telephone apparatus with remote access function for external network and remote access method for mobile communication system |
GB2407458A (en) * | 2003-08-07 | 2005-04-27 | Radioscape Ltd | Preventing use of lost/stolen article by transmission of blocking code |
GB2407458B (en) * | 2003-08-07 | 2006-05-24 | Radioscape Ltd | Method of preventing use of a lost or stolen device including a digital transmission receiver |
Also Published As
Publication number | Publication date |
---|---|
CN1398097A (en) | 2003-02-19 |
US20030013491A1 (en) | 2003-01-16 |
GB2379583B (en) | 2003-10-01 |
GB0215887D0 (en) | 2002-08-14 |
JP2003032354A (en) | 2003-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2379583A (en) | Outgoing call control and data transfer for a portable terminal device | |
US10051100B2 (en) | Mobile terminal apparatus | |
US7200220B1 (en) | Portable telephone maintenance service system and maintenance service method | |
US7292843B2 (en) | Function-limiting device and function-limiting method | |
US5933785A (en) | Telephone and method for concurrent registration of two identification numbers using multi-number sim card | |
US7275695B2 (en) | Portable terminal and function limiting method | |
EP0865217A2 (en) | Telecommunications system | |
US20040043752A1 (en) | Terminal for wireless communication | |
US6470082B1 (en) | Communications system using portable recording medium | |
JP2001230858A (en) | Mobile phone system and mobile phone | |
JP3357592B2 (en) | Mobile station information storage device and mobile communication system | |
US20050003800A1 (en) | Cellular phone having mail and schedule functions | |
JP2000174894A (en) | Portable telephone set | |
JP2002281148A (en) | Mobile telephone | |
CA2552480A1 (en) | Cell phone feature for downloading information via a telecommunications network | |
JP2004289690A (en) | Mobile terminal device | |
US20040048602A1 (en) | Mobile telephone apparatus with remote access function for external network and remote access method for mobile communication system | |
EP0744875B1 (en) | Subscriber number storing device and mobile station using the same | |
JP2004356685A (en) | Portable communication terminal and system for controlling portable communication terminal | |
JP3652893B2 (en) | Satellite communication terminal | |
JP4199056B2 (en) | Control device and control system | |
JP2001111703A (en) | Mobile wireless communication terminal device and remote control method for the mobile wireless communication terminal device | |
JP2001127878A (en) | Radio communication system and portable telephone set | |
JP2002158771A (en) | Telephone network system for phone exchange by personal id | |
JP2002368875A (en) | Communication service method and communication service system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20141023 AND 20141029 |
|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20170709 |